IBM Squashes Worms - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

IBM Squashes Worms

Innovative security software is being tested in Europe.

IBM researchers in Zurich, Switzerland, have developed novel worm-squashing software the company says it wants to turn into a product to help guard against computer-network attacks such as those that slowed Internet traffic earlier this month.

For the last few months, a PC loaded with the new software, code-named Billy Goat, has kept watch over IBM's corporate network from the company's large research lab outside Zurich. The system uses a unique approach to detecting malicious software by looking at traffic flowing to Internet addresses that aren't assigned to specific computers, trying to isolate computers on a network that attempt to infect others. IBM is also testing the system at Bluewin, the Internet service provider unit of Swisscom AG, the Swiss national telephone company.

The software could cut down on the number of false alarms generated by commercial intrusion-detection software that tries to analyze the behavior of traffic on computer networks, says Andreas Wespi, a manager in IBM's Global Security Analysis Lab in Zurich. "Worms are spreading so quickly in the first place that only a behavior-based approach has a chance to detect them," he says. The Slammer worm that wreaked havoc on the Internet in January spread around the world within 15 minutes of release. The Sobig worm released this month also spread rapidly.

To be sure, several companies have developed software products that analyze networks' behavior to ward off new attacks, in addition to dectecting the "signatures" of documented viruses and worms. Cisco Systems in January bought Okena Inc., a maker of behavior-based intrusion-detection tools. Network Associates has acquired technology in the area as well.

IBM says its prototype combines the strength of analyzing traffic directed at IP addresses assigned to computers on a network with the ability to look at the unassigned addresses worms also target. It also can sniff out the signatures of known attacks. By testing the software at a large ISP, IBM can collect more data on worm traffic and help decide how to bring Billy Goat to market, says Adrian Schlund, a manager at IBM Global Services. "We have quite a big business potential for Billy Goat," he says. The company is considering bringing the technology to market in its Tivoli software products, or as part of a security service sold to companies by IBM.

Every little bit could help at a company that's had difficulty commercializing technology from its security labs, says John Pescatore, an analyst at market research company Gartner. "There's definitely room for improvement in intrusion detection," he says. Companies need systems with faster response times, and fewer false alarms. "If IBM is doing stuff that can run at the [ISP] level, that's where we need the help."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll